cybersecurity Crossword Puzzles
26 2024-01-08
Across
- The activity of exploiting genetic material experimentally without regard to ethical considerations.
- Commercial transactions conducted electronically on the Internet.
- Change Long-term change in the average weather patterns that have come to define Earth's local, regional, and global climates. (Note: Repeated for variety.)
- Including all or everyone; not excluding any particular group or individual.
- A step-by-step procedure or formula for solving a problem or accomplishing a task.
- The remote diagnosis and treatment of patients by means of telecommunications technology.
- A digital or virtual form of currency that uses cryptography for security.
Down
- Work Working from a location other than the central office, often from home.
- The practice of protecting systems, networks, and programs from digital attacks. (Note: Repeated for variety.)
- A step-by-step procedure or formula for solving a problem or accomplishing a task. (Note: Repeated for variety.)
- Reality An artificial environment created with the help of computer technology, often including simulated physical presence.
- A digital or virtual form of currency that uses cryptography for security. (Note: Repeated for variety.)
12 Clues: Commercial transactions conducted electronically on the Internet. • A digital or virtual form of currency that uses cryptography for security. • Work Working from a location other than the central office, often from home. • Including all or everyone; not excluding any particular group or individual. • ...
Jaringan Komputer dan Internet Elda 2024-01-14
Across
- kerangka kerja konseptual yang membagi fungsi komunikasi jaringan menjadi tujuh lapisan
- perangkat yang menghubungkan perangkat lain dalam jaringan tanpa memperhatikan alamat tujuan
- suatu sistem yang saling berhubungan antara satu dengan lainnya sehingga dapat saling berbagi informasi, program-program, penggunaan bersama perangkat keras
- salah satu aspek jaringan komputer yang berfungsi berbagi sumber daya atau resource sharing seharusnya dapat dilakukan tanpa terkendala jarak
- salah satu contoh Transmission Control Protocol/Internet Protocol (TCP/IP) yang umumnya dipakai dalam model client-server mencakup banyak protokol lintas lapisa
- layer bertanggung jawab mempersiapkan data agar digunakan program tertentu
Down
- pengumpulan proses, kebijakan, peran, metrik, dan standar yang memastikan penggunaan informasi secara efektif
- salah satu jenis topologi jaringan yang digunakan untuk menghubungkan sebuah komputer dengan komputer lainnya dalam sebuah rangkaian yang berbentuk melingkar seperti cincin
- pengaman siber merupakan praktik melindungi komputer
- salah satu jaringan yang berfungsi untuk menghubungkan perangkat jaringan dalam jangkauan yang relatif kecil
10 Clues: pengaman siber merupakan praktik melindungi komputer • layer bertanggung jawab mempersiapkan data agar digunakan program tertentu • kerangka kerja konseptual yang membagi fungsi komunikasi jaringan menjadi tujuh lapisan • perangkat yang menghubungkan perangkat lain dalam jaringan tanpa memperhatikan alamat tujuan • ...
MIS Crosswords 2025-02-07
Across
- In the Otis Case Study, it was a key unit responsible for order fulfillment, supply chain coordination, and customer service.
- Zara relied on this system to record transactions, but it ran on DOS, an outdated operating system.
- The risk of dependency on a single cloud provider for regulatory data services.
- The logistics model Otis moved towards, ensuring components arrived at job sites only when needed.
- As IT becomes ubiquitous, this becomes a major business concern.
Down
- Unlike competitors, Zara controlled its manufacturing and distribution, reducing lead times.
- The modern form of IT infrastructure where businesses rent computing power instead of owning it.
- The principle that IT systems become more valuable as more users join them.
- Ensuring adherence to regulatory standards, a significant challenge in cloud adoption for financial institutions.
- A role responsible for managing data quality and governance at the business line level.
10 Clues: As IT becomes ubiquitous, this becomes a major business concern. • The principle that IT systems become more valuable as more users join them. • The risk of dependency on a single cloud provider for regulatory data services. • A role responsible for managing data quality and governance at the business line level. • ...
STEM Careers Part 1 2025-05-01
Across
- Diagnoses, treats, and prevents diseases and injuries in animals, providing medical care and advice to animal owners.
- An advanced practice registered nurse specializing in the administration of anesthesia and the management of patients before, during, and after surgical procedures and other medical interventions.
- Studies the relationships between living organisms and their environment, focusing on how changes to the environment impact populations, species, and ecosystems.
- Protects an organization's data and information systems by managing security software, educating personnel on cybersecurity best practices, and responding to security incidents.
- Designs, develops, and improves mechanical devices, systems, and processes.
Down
- Investigates and analyzes digital evidence related to cybercrimes and security incidents.
- Responsible for writing, testing, and maintaining computer code to create software applications.
- Ensures that products and materials meet specified quality standards at various stages of production.
- Provides comprehensive patient care, including diagnosis, treatment, and management of various health conditions.
- Analyzes, experiments with, and creates chemical compounds, often working in laboratory settings.
10 Clues: Designs, develops, and improves mechanical devices, systems, and processes. • Investigates and analyzes digital evidence related to cybercrimes and security incidents. • Responsible for writing, testing, and maintaining computer code to create software applications. • ...
MHI - Crossword 2024-08-27
Across
- Abbreviation for the digital version of a patient's medical history
- The ability of different health information systems to work together within and across organizational boundaries
- Largest hospital network and health research organizationin Canada
- An online platform that gives patients access to their health information and the ability to communicate with healthcare providers
- Last Name of MHI Program Director
- An independent, not-for-profit corporation dedicated to AI research
- The use of telecommunications technology to provide clinical healthcare from a distance
- The simulation of human intelligence in machines, often used in predictive analytics (2 words)
Down
- The practice of protecting systems, networks, and programs from digital attacks in the healthcare industry
- A MHI Prof is the founder of this company that creates digital health solutions
- UofT website where you can find your transcript
- State of physical, emotional, and mental exhaustion often experienced by healthcare professionals due to prolonged stress
- Permission given by a patient to share their personal health information with others.
- The largest academic science and health science library in Canada
- The social media platform used mainly for networking
- The institution that the MHI Program falls under
- The sequence of processes through which a piece of work passes from initiation to completion in healthcare settings
17 Clues: Last Name of MHI Program Director • UofT website where you can find your transcript • The institution that the MHI Program falls under • The social media platform used mainly for networking • The largest academic science and health science library in Canada • Largest hospital network and health research organizationin Canada • ...
Cybersecurity Awarness/ Safty in the digital world 2024-01-31
Across
- سلوك التهديد من خلال الوسائل الإلكترونية مثل الرسائل النصية
- أمر ضروري لبقاء برامج مكافحة الفيروسات فعالة ضد التهديدات الجديدة والمتطورة
- جميع التقنيات التي تهدف إلى إقناع هدف ما بالكشف عن معلومات محددة أو القيام بعمل محدد لأسباب غير مشروعة(Two Words)
- Facebook, Twitter, Instagram..Are?(Two Words)
- عملية أخذ نص عادي وجعله غير قابل للقراءة
- اختراق الأجهزة والشبكات الرقمية من خلال الوصول غير المصرح به إلى الحساب أو نظام الكمبيوتر
- رسالة بريد إلكتروني احتيالية يُزعم أنها من شركة حسنة السمعة تحاول الحصول على معلومات شخصية
- الأجهزة أو البرامج المصممة لمنع الوصول غير المصرح به إلى شبكةخاصة
- أداة أمنية تعمل على إنشاء اتصال آمن ومشفر بينك وبين الإنترنت
- ضمان إمكانية الوصول إلى الأنظمة والبيانات من قبل المستخدمين المصرح لهم عند الحاجة
Down
- يلعب دورًا حاسمًا في حماية أنظمة الكمبيوتر من التهديدات الضارة
- وهي منع الضرر وحماية الأجهزة والأنظمة الإلكترونية بما في ذلك المعلومات الواردة فيها، لضمان توافرها وسلامتها وتوثيقها وسريتها وعدم فقدانها(Two words)
- برامج الكمبيوتر الضارة مثل الفيروسات والديدان وأحصنة طروادة التي يستخدمها المتسللون للوصول إلى جهاز الكمبيوتر الخاص بك والتسبب في تدميره.
- قيام المستخدم بمشاركة معلومات عن نفسه عمدًا(Two Words)
- حماية معلومات النظام أو العمليات من التعديل المتعمد أو العرضي
- يجب أن تتكون من حروف كبيرة وصغيرة وأرقام وأحرف خاصة
- منع الكشف عن المعلومات الحساسة من الأشخاص والموارد والعمليات غير المصرح لهم
- خلل أو ضعف في نظام الكمبيوتر يمكن استغلاله لانتهاك أمن النظام
- نوع من البرامج الضارة المصممة لمنع الوصول إلى نظام الكمبيوتر حتى يتم دفع مبلغ من المال
19 Clues: عملية أخذ نص عادي وجعله غير قابل للقراءة • Facebook, Twitter, Instagram..Are?(Two Words) • يجب أن تتكون من حروف كبيرة وصغيرة وأرقام وأحرف خاصة • قيام المستخدم بمشاركة معلومات عن نفسه عمدًا(Two Words) • سلوك التهديد من خلال الوسائل الإلكترونية مثل الرسائل النصية • أداة أمنية تعمل على إنشاء اتصال آمن ومشفر بينك وبين الإنترنت • ...
Cross Word Questions for Q1 Newsletter 2023-07-17
Across
- How many escalators were/are going to be replaced serving he Flushing Line platform and Lexington Avenue mezzanine?
- How many people celebrated their milestone anniversary?
- From the Employee Spotlight corner, which Employee wants his next big trip to be Japan?
- What was the topic of Quarter 1’s Tech Tip?
- Which storm caused significant damage to the New York City area prompting Long Island Railroad/Metropolitan Transportation Authority to construct floodwalls around existing rail yards?
- What brand of ice cream was served at the Build Your Own Sunday event?
- Which employee has been in the engineering field for over 40 years?
- Which award was given to the entire company?
Down
- Who do you reach out to if you are interested in volunteering with Naik?
- If you are in the NY office and need a break, where can you find an array of games to help break up the day?
- What is Sweety’s baby’s first name?
- From the HR corner, what is the third top health issue that impacts women?
- What month did Meet Desai get married?
13 Clues: What is Sweety’s baby’s first name? • What month did Meet Desai get married? • What was the topic of Quarter 1’s Tech Tip? • Which award was given to the entire company? • How many people celebrated their milestone anniversary? • Which employee has been in the engineering field for over 40 years? • ...
fintech 2024-03-05
Across
- digitally distributed, decentralized, public ledger that exists across a network
- type of technology that is considered environmentally friendly based on its production process or its supply chain
- the practice of protecting systems, networks, and programs from digital attacks
Down
- utilization of technology, for example, big data and artificial intelligence(AI), to offer an alternative to conventional wealth management firms
- the use of technology innovations to bring in savings and efficiency to the insurance industry model
- management of regulatory monitoring, reporting, and compliance within the financial industry through technology
- any payments that involve technology, such as paying bus fare with a QR code or tapping a mobile phone on a credit card reader
7 Clues: the practice of protecting systems, networks, and programs from digital attacks • digitally distributed, decentralized, public ledger that exists across a network • the use of technology innovations to bring in savings and efficiency to the insurance industry model • ...
Lane Degree Programs 2022-06-01
Across
- Begin your education here and maybe in the future you'll be building bridges or designing cities
- Learn this hospitality art in the Renaissance Room
- Lane provides a hands on learning environment for folks who love a beautiful smile
- Analyze movies and develop critical thinking in this area of study
- Inflation? Price Gauging? These students might be able to explain what's going on with your wallet
- If your teacher is Camilla Mortensen what might you be studying?
- Get out your beakers and head to building 16 with your lab coat
- Travel the world without ever leaving your desk
- Channel your inner Freud and start analyzing
Down
- Learn to fly and maintain airplanes in this discipline
- Learn to fuse metals together, maybe be in a Flashdance remake
- In the age of computers this job is more important than ever to keep us safe
- Love numbers and finance? Learn your assets, losses, and cash flows with this degree
- Take this language class to feel closer to the indigenous people of the Willamette Valley
- In building 5 you can see these students glide through the space. Maybe you'll see a future ballet star.
15 Clues: Channel your inner Freud and start analyzing • Travel the world without ever leaving your desk • Learn this hospitality art in the Renaissance Room • Learn to fly and maintain airplanes in this discipline • Learn to fuse metals together, maybe be in a Flashdance remake • Get out your beakers and head to building 16 with your lab coat • ...
technology 2023-05-08
Across
- perceiving, synthesizing, and inferring information
- describes a wide range of technologies that reduce human intervention in processes
- the activity of electronically buying or selling
- a set of computer programs and associated documentation and data
- the use of computers to create,process, store, retrieve and exchange all kinds of data and information.
Down
- includes the physical parts of a computer
- is the protection of computer systems and networks from attack by malicious actors
- a family of wireless network protocols based on the IEEE 802.11 family of standards
- the transfer of information between two or more points without the use of an electrical conductor.
- a database is an organized collection of data stored and accessed electronically.
- the global system of interconnected computer networks that uses the Internet protocol suite to communicate between networks and devices.
- is the most important processor in a given computer.
- a device that accepts information (in the form of digitalized data)
- a scientific and engineering discipline that studies and applies the principles of physics to design, create, and operate devices that manipulate electrons and other charged particles.
- the application of scientific knowledge for practical purposes, especially in industry.
15 Clues: includes the physical parts of a computer • the activity of electronically buying or selling • perceiving, synthesizing, and inferring information • is the most important processor in a given computer. • a set of computer programs and associated documentation and data • a device that accepts information (in the form of digitalized data) • ...
ByteCross 2024-07-18
Across
- A sequence of steps that an AI system follows to solve a problem.
- A statistical model used to make predictions or decisions without being explicitly programmed to perform the task
- An AI planning problem involving an agent navigating a cave to avoid pits and a dangerous creature
- A popular programming language for data analysis and machine learning
- The process of extracting useful information from large datasets
- The ability of a machine to imitate intelligent human behavior
- A subset of AI that involves neural networks with many layers
Down
- A problem-solving method used by AI to find solutions in a large search space.
- A set of inputs and outputs used to train an AI model.
- A software tool used for data visualization and analysis in R.
- A type of network inspired by the human brain, used in deep learning
- The process of cleaning, transforming, and modeling data to discover useful information
- The branch of AI that deals with the simulation of intelligent behavior in computers
- A framework or tool used for developing and training machine learning models
- The practice of protecting systems and networks from digital attacks
15 Clues: A set of inputs and outputs used to train an AI model. • A subset of AI that involves neural networks with many layers • A software tool used for data visualization and analysis in R. • The ability of a machine to imitate intelligent human behavior • The process of extracting useful information from large datasets • ...
Browsing safely 2025-06-14
Across
- he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- repeated harmed through the use of computers, cell phones, and other electronic devices
- a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- type of computer program that's designed to seek out and remove computer viruses that have infected
- data that directly follow either by clicking
- when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- text files with small data
- a threat that involves sending email messages with a fake sender address
Down
- the process of befriending someone online and make them do a physical meeting and physically harm them
- unauthorized users who gain access to computers in order to steal, alter, or delete data
- appears when an application wants you to pay attention.
- software that spreads between computers and causes damage to data and software.
- illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- deceive people into revealing sensitive information or installing malware
- Web pages, links in one domain
15 Clues: text files with small data • Web pages, links in one domain • data that directly follow either by clicking • appears when an application wants you to pay attention. • a threat that involves sending email messages with a fake sender address • deceive people into revealing sensitive information or installing malware • ...
Browsing safely 2025-06-14
Across
- he practice of protecting networks, applications, sensitive information, and users from cyber attacks
- repeated harmed through the use of computers, cell phones, and other electronic devices
- a act of omission or conduct by any person in the course of a banking transaction or in the bank’s books of accounts, which results in unlawful temporary gain
- type of computer program that's designed to seek out and remove computer viruses that have infected
- data that directly follow either by clicking
- when someone steals your personal information and uses it for financial or other fraudulent purposes without your permission
- text files with small data
- a threat that involves sending email messages with a fake sender address
Down
- the process of befriending someone online and make them do a physical meeting and physically harm them
- unauthorized users who gain access to computers in order to steal, alter, or delete data
- appears when an application wants you to pay attention.
- software that spreads between computers and causes damage to data and software.
- illegal activities involving computers, networks, or the internet as a tool to commit attacks.
- deceive people into revealing sensitive information or installing malware
- Web pages, links in one domain
15 Clues: text files with small data • Web pages, links in one domain • data that directly follow either by clicking • appears when an application wants you to pay attention. • a threat that involves sending email messages with a fake sender address • deceive people into revealing sensitive information or installing malware • ...
Connections, Communication and The Cloud 2025-08-11
Across
- Securing individual assets rather than relying one single network perimeter
- A security enhancement that requires users to provide more than one form of identification to access an account or system
- Digital world where users, represented by avatars, can interact with each other and digital environments, often through virtual reality (VR) or augmented reality (AR)
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers
- The concept of automating everything in an organization that can be automated
- The delivery of various IT solutions, applications, and infrastructure as a service over the internet
- technologies that enhance or replace our view of the world
- A process used to identify weaknesses in systems, applications, or networks that could be exploited by attackers
Down
- Covers the cost of losses and damages related to IT and networks
- A computer capable of completing tasks humans typically require intelligence for
- A cybersecurity technology that continuously monitors and responds to suspicious activities on endpoints like computers, servers, and mobile devices
- Securing individual assets rather than relying one single network perimeter
- A set of practices and technology
- Managed by one provider but in many different locations
- Technology designed to minimise negative environmental impact
- Various ways
16 Clues: Various ways • A set of practices and technology • Managed by one provider but in many different locations • technologies that enhance or replace our view of the world • Technology designed to minimise negative environmental impact • Covers the cost of losses and damages related to IT and networks • ...
crossword 2025-09-16
Across
- Exploit that targets stack buffer overflow or OS in memory.
- A comprehensive assessment and analysis of an organization’s cybersecurity and cyber risks.
- An APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
- Attack that redirects users to malicious sites by corrupting DNS cache entries with forged responses.
- A security standard that outlines the minimum required security controls for an organization's systems.
- Attack where malicious software secretly records everything typed on the keyboard.
- Technology that stores data and applications online instead of local servers.
- Tool widely used for finding and exploiting web application vulnerabilities.
Down
- A requirement that prevents use of default passwords or weak authentication methods.
- Malware that hides in system memory without leaving traces on disk.
- Security technique that isolates code execution in a controlled environment to prevent it from affecting the broader system.
- A unique identifier generated by the server to maintain a user's session, typically used by web applications.
- Tool aggregates and analyzes log and event data to detect threats and support incident response.
- Practice that enforces permissions based on job roles.
- A malware designed to give hackers access to and control over a target device.
15 Clues: Practice that enforces permissions based on job roles. • Exploit that targets stack buffer overflow or OS in memory. • Malware that hides in system memory without leaving traces on disk. • Tool widely used for finding and exploiting web application vulnerabilities. • Technology that stores data and applications online instead of local servers. • ...
Puzzle - 4 2022-10-10
Across
- used by attackers to gain access to a computer or a network.
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- when someone uses a social network to create an account with a fake identity to deceit a concrete person.
- Security as a Service
- A combination of the words "robot" and "network"
Down
- a type of malware that is aimed to infect and harm a file, a system or a network
- A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- S/w that automatically displays / downloads material when user is offline
- a malicious code that is designed to harm computers and systems.
- an error, flaw, failure or fault in a computer program or system that causes an unintended code interaction
10 Clues: Security as a Service • A combination of the words "robot" and "network" • used by attackers to gain access to a computer or a network. • a malicious code that is designed to harm computers and systems. • S/w that automatically displays / downloads material when user is offline • a type of malware that is aimed to infect and harm a file, a system or a network • ...
Ethics & Compliance Week 2022 2022-08-26
Across
- Conforming to a rule, such as a specification, policy, standard or law.
- The practice of protecting systems, networks and programs from digital attacks.
- Protects the patient’s right to privacy of health information and what appropriate safeguards are required to protect this information.
- Wrongful or criminal deception intended to result in financial or personal gain.
Down
- The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- Moral principles that govern a person’s behavior or the conducting of an activity.
- The act, process of power of exercising authority or control in an organizational setting
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
- Making choices that are consistent with each other and with the stated and operative values one espouses.
- Taking responsibility for one's actions.
10 Clues: Taking responsibility for one's actions. • Conforming to a rule, such as a specification, policy, standard or law. • The practice of protecting systems, networks and programs from digital attacks. • Wrongful or criminal deception intended to result in financial or personal gain. • ...
Chapter 2 Vocabulary 2023-09-06
Across
- China produces the most goods in the world. This means that they have a very strong ______
- China sells the US the most electronic exports in the world. Electronic exports are considered ____
- I use the school bus every morning to get to school. The School bus is a _____
- Customers of Apple are insisting they make more units for sale, this is called _____
- I am going to spend money on gas instead of food, this is called a _____
- Apple has only made 5,000 units of a product, this is called _____
Down
- Resources Everything from farmers to buildings are considered _______
- Instead of buying food, you would use that money to buy expensive clothes, which is a _____
- I want to start a cybersecurity company, this would mean that I want to become an ______
- Instead of buying expensive clothes, you would use that money to buy groceries, which is a ____
10 Clues: Apple has only made 5,000 units of a product, this is called _____ • Resources Everything from farmers to buildings are considered _______ • I am going to spend money on gas instead of food, this is called a _____ • I use the school bus every morning to get to school. The School bus is a _____ • ...
Crossword 2024-09-17
Across
- A decentralized digital ledger that records transactions across many computers.
- Practices designed to protect networks, devices, and data from unauthorized access or attacks.
- The latest generation of cellular network technology, providing faster speeds and low latency.
- A subset of artificial intelligence where computers learn from data without being explicitly programmed.
- An immersive experience that simulates a physical environment using computer technology.
Down
- A new form of computing that uses quantum bits, or qubits, to perform calculations faster than classical computers.
- A technology that allows users to access and store data and applications over the internet rather than on local servers.
- A model where data is processed near the source of data generation, reducing latency.Down:
- Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
- Machines designed to perform tasks that typically require human intelligence, such as speech recognition and decision-making.
10 Clues: A decentralized digital ledger that records transactions across many computers. • An immersive experience that simulates a physical environment using computer technology. • A model where data is processed near the source of data generation, reducing latency.Down: • ...
Technology in our lives 2024-12-21
Across
- – A type of computing that uses quantum mechanics to perform complex calculations much faster than traditional computers.
- – The process of creating new ideas, methods, or products that bring improvement or solve problems.
- – A branch of computer science that enables machines to perform tasks that typically require human intelligence, such as problem-solving and learning.
- – The science of building and using materials or devices at the nanoscale (extremely small sizes).
- – A field of AI where computers learn from data and improve their performance without being explicitly programmed.
Down
- – A technology that overlays digital information or images on the real-world environment.
- – The practice of protecting computers, networks, and data from unauthorized access or attacks.
- – The use of machines or technology to perform tasks without human assistance.
- – The ability to connect devices or systems to each other for communication and data exchange.
- – The practice of meeting current needs without harming future generations or the environment.
10 Clues: – The use of machines or technology to perform tasks without human assistance. • – A technology that overlays digital information or images on the real-world environment. • – The ability to connect devices or systems to each other for communication and data exchange. • ...
ISM CROSSWORD PUZZLE 2025-07-04
Across
- EVIDENCE: Quantitative or qualitative information records or statement
- Personnel carrying audits should be _____ of the areas being audited
- Interim DOC is issued for ___ months
- A statement of fact made during a safety management audit and substantiated by objective evidence
- the owner of the ship or any other organization or person such as the manager, or the bareboat charterer, who has assumed the responsibility for operation of the ship from the shipowner and who, on assuming such responsibility, has agreed to take over all the duties and responsibility imposed by the Code.
- ISM Clause 4
Down
- Risk=Likelihood X ______
- Resolution MSC.428 (98) mandates that these risks be addressed in compliance with the International Safety Management (ISM) Code.
- MISS: A sequence of events and/or conditions that could have resulted in loss
- Acronym which indicates that the risk should be lowered as low as reasonably practicable
10 Clues: ISM Clause 4 • Risk=Likelihood X ______ • Interim DOC is issued for ___ months • Personnel carrying audits should be _____ of the areas being audited • EVIDENCE: Quantitative or qualitative information records or statement • MISS: A sequence of events and/or conditions that could have resulted in loss • ...
Information Governance 2022-05-05
Across
- Ensuring timely and reliable access to and use of information
- Evidence of a business activity
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- The process of adhering to policies and decisions
- Delegated responsibility for information management to appropriate individuals
- A measure of the extent to which an entity is threatened by a potential circumstance or event
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- The process of safeguarding important information from corruption, compromise or loss cybersecurity involves protecting that information by preventing, detecting, and responding to cyber attacks
- Ability of an organization to make its stakeholders accessible the information needed to make decisions
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
11 Clues: Evidence of a business activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • A measure of the extent to which an entity is threatened by a potential circumstance or event • ...
Cyber Security Incident Response and Recommendations 2025-11-21
Across
- (4,10) Ensure compliance with GDPR and secure storage of sensitive parent data. (Key Security Requirements)
- (12,8) Implement Multi-Factor Authentication (MFA) for all staff accounts to prevent unauthorized access. (Key Security Requirements)
- Financial loss, data breach, reputational damage, and regulatory risk. (Incident Overview)
- (4-4) MFA, Explore Zero Trust and AI-based threat detection for future resilience. Phase 3 (Recommended Approach)
- (6-4) Develop incident response plan and review data protection policies. Phase 2 (Recommended Approach)
- (5,8) Deploy advanced email filtering and sandboxing for attachments to block phishing attempts. (Key Security Requirements)
Down
- (4,5) Lack of multi-factor authentication (MFA), insufficient phishing awareness, and inadequate email security controls - sending CSV files unencrypted. (Incident Overview)
- (8,8) Establish a formal incident response plan with clear escalation procedures. (Key Security Requirements)
- Implement email filtering, and staff training. Phase 1 (Recommended Approach)
- (4,9) Conduct regular phishing simulations and cybersecurity training for staff. (Key Security Requirements)
- (4,2,6) Phishing leading to email compromise and financial fraud. (Incident Overview)
11 Clues: Implement email filtering, and staff training. Phase 1 (Recommended Approach) • (4,2,6) Phishing leading to email compromise and financial fraud. (Incident Overview) • Financial loss, data breach, reputational damage, and regulatory risk. (Incident Overview) • ...
CYBERSECURITY - PHISHING 2021-12-01
Across
- phishing emails may contain _____ to Malicious websites
- Email scam or attempt to trick you into giving your password or personal information
Down
- consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
- Someone who seeks and exploits weaknesses in a computer system or computer network.
4 Clues: phishing emails may contain _____ to Malicious websites • Someone who seeks and exploits weaknesses in a computer system or computer network. • Email scam or attempt to trick you into giving your password or personal information • consists of technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks
Total Defence Day 2024-01-18
Across
- Being sensitive and u___________ towards the cultures and traditions of others is how we build up Social Defence.
- Civil Defence provides for the safety and basic needs during e_________ so that life can go on as per normal.
- Good c____________ habits such as not revealing passwords and personal information is a good way to play our part in Digital Defence.
Down
- Taking care of the e_________ is one way to play our part in Economic Defence.
- Psychological Defence - To keep Singapore strong and special by being u________.
- Singaporeans have a p______ to play in Total Defence.
- Total Defence Day seeks to remind people of the s_________ endured by our forefathers.
- Military Defence is about building up a strong and formidable force to p_________ the country.
8 Clues: Singaporeans have a p______ to play in Total Defence. • Taking care of the e_________ is one way to play our part in Economic Defence. • Psychological Defence - To keep Singapore strong and special by being u________. • Total Defence Day seeks to remind people of the s_________ endured by our forefathers. • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
Lesson 2 2024-02-13
Across
- The art of writing or solving codes to secure digital information.
- The practice of protecting computers, networks, programs, and data from unauthorized access or attacks, which often relies on cryptographic methods.
- The process of converting information into a code to prevent unauthorized access.
Down
- A fundamental aspect of cryptography aimed at protecting the confidentiality of digital communications and information.
- A technique for ensuring data integrity by converting information into a fixed-size string of characters.
5 Clues: The art of writing or solving codes to secure digital information. • The process of converting information into a code to prevent unauthorized access. • A technique for ensuring data integrity by converting information into a fixed-size string of characters. • ...
WotD 2023-11-05
Across
- Capable of being maintained or continued over the long term without harming the environment or depleting resources.
- The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- To bring about a complete change in something, typically in a significant and dramatic way.
Down
- The use of largely automatic equipment and systems in various processes, reducing the need for human intervention.
- Introducing or using new ideas, methods, or equipment.
5 Clues: Introducing or using new ideas, methods, or equipment. • To bring about a complete change in something, typically in a significant and dramatic way. • The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access. • ...
WHO Identifies Risk 2024-07-02
Across
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
WHO Identifies Risk 2024-07-02
Across
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
WHO Identifies Risk 2024-07-02
Across
- monitors risks related to data security, privacy breaches, and operational disruptions through cybersecurity assessments and incident monitoring
- identify risks through direct pt care, clinical judgment, and participation in incident reporting & medical record reviews
Down
- identify risk systematically by using formal risk assessments, incident reports, and claim data
- identify risks through audits, inspections, and review of compliance w/ healthcare standards
- contributes insights through patient feedback, complaints, and involvement in incident reporting systems
5 Clues: identify risks through audits, inspections, and review of compliance w/ healthcare standards • identify risk systematically by using formal risk assessments, incident reports, and claim data • contributes insights through patient feedback, complaints, and involvement in incident reporting systems • ...
Cybersecurity Awareness 2023-10-10
Across
- Is the short form for “malicious software”,
- is when someone or something pretends to be something else to gain a victim's trust, get access to a system, steal data, or spread malware.
Down
- An exploit is a code or program developed to find and take advantage of a security flaw
- The ability and opportunity to obtain knowledge of classified information.
4 Clues: Is the short form for “malicious software”, • The ability and opportunity to obtain knowledge of classified information. • An exploit is a code or program developed to find and take advantage of a security flaw • is when someone or something pretends to be something else to gain a victim's trust, get access to a system, steal data, or spread malware.
Total Defence Day 2022 2022-01-20
Across
- The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984
- Civil Defence provides for the _ _ _ _ _ _ and basic needs of the whole community so that life may go on as normally as possible during emergencies.
- _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression
Down
- Digital Defence is the new sixth pillar of Total Defence. It requires Singaporean to practice good _ _ _ _ _ - _ _ _ _ _ _ _ _
- Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency
- You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency
- _ _ _ _ _ defence day is commemorated on 15th February. the day colonial Singapore surrendered to Japan in 1942 during World War II
7 Clues: You should call 995 for _ _ _ _ _ _ _ _ _ and 1777 for non-emergency • The Total Defence song "There's a Part for _ _ _ _ _ _ _ _" was written in 1984 • _ _ _ _ _ _ _ _ Defence is about having an SAF that is able to deter aggression • Learning life-saving skills such as _ _ _ can prepare you to help others in an emergency • ...
Week 1: Intro to Cybersecurity 2025-09-17
Across
- A term for information
- This general term for security practices relating to computers
- A style of attack that is used to gather data, information, or other knowledge to gain unwarranted access
- This tool allows an individual to identify themselves as a specific person, granting them access to systems particular to them
Down
- This complex string of characters is used to log-in to a device, service, or other secure
- A term relating to an outside entity that in some way supports an organization (e.g. Workday is a third-party for JMS)
- A recent technological development, where a machine can "think" and/or "learn" based off the information you provide.
7 Clues: A term for information • This general term for security practices relating to computers • This complex string of characters is used to log-in to a device, service, or other secure • A style of attack that is used to gather data, information, or other knowledge to gain unwarranted access • ...
Internet Safety Crossword - Kim Chart 2025-02-26
Across
- a type of cybercrime where a criminal poses as a known person
- any criminal that involves a computer network or networked devices
- a frequently updated web page used for personal commentary or business content
- small text files that websites store on your computer to remember information about you and your browsing activity
- the international video recorded assault of individuals
- the trail data you leave when using the internet
- sending fraudulent communications that appear to come from different sources
- an online individual who uses the internet as a means to commit harassment
Down
- the practice of protecting systems networks and digital attacks
- any form of making fun or bullying someone without being in person
- settings controls available on many websites and apps to limit who can access your profile
- the act of someone causing discord online or in person
- an ideal pattern of behavior for internet users about what is acceptable
- sending you intimate or sexual content and asking you to share the same thing in return
- an image digitally altered using image editing software
- any kind of communication over the internet
- a tyoe of malware which prevents you from accessing your device and the data stored on it
- short strings of words in capital letters
- unauthorized use copying or distribution of copyrighted software
19 Clues: short strings of words in capital letters • any kind of communication over the internet • the trail data you leave when using the internet • the act of someone causing discord online or in person • an image digitally altered using image editing software • the international video recorded assault of individuals • ...
CYBER SECURITY PUZZLE 2022-02-17
Across
- malware that employs encryption to hold a victim's information at ransom.
- weaknesses in a system that gives threats the opportunity to compromise assets.
- uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
- type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
- the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
- intrusive software that is designed to damage and destroy computers and computer systems
- threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
- type of malicious code or software that looks legitimate but can take control of your computer.
8 Clues: malware that employs encryption to hold a victim's information at ransom. • weaknesses in a system that gives threats the opportunity to compromise assets. • uses trial-and-error to guess login info, encryption keys, or find a hidden web page. • intrusive software that is designed to damage and destroy computers and computer systems • ...
CS Month Week 3 2023-09-14
Across
- Your _______ is like your underwear: don’t share it with your friends and change it often.
- A person skilled in computer programming and system manipulation, often referring to both ethical and malicious individuals.
- Malware that records keystrokes on a computer, capturing sensitive information like passwords and credit card details.
Down
- Cybersecurity ________: A structured approach that defines guidelines and best practices for securing information systems.
- _______ Force – password attack method where many passwords are submitted with the hopes of guessing the correct one.
- Personally Identifiable Information
- ______ Control: The practice of restricting access to resources based on user roles and permissions to prevent unauthorized access.
- ________-factor Authentication: A security method that requires users to provide multiple forms of verification to access an account or system, enhancing security beyond passwords.
8 Clues: Personally Identifiable Information • Your _______ is like your underwear: don’t share it with your friends and change it often. • _______ Force – password attack method where many passwords are submitted with the hopes of guessing the correct one. • ...
Browsing Safely 2025-06-02
Across
- The act of harassing or harming some using technology in a deliberate manner
- A program that disrupts the normal functioning of a computer
- A computer program designed to indentify,prevent and remove viruses from a computer
- Any criminal activity using a computer and an internet connection
- The act of stealing and misusing someone's personal information
- Used to conduct terrorism through computers and internet to cause fear and panic
- Use of illegal methods to get money from banks and their customers
Down
- Another name for Cybercriminals
- A collection of technologies and practices to protect computers from damage or unauthorised access
- The process of 'befriending' children on social media to facilitate online or physical sexual abuse.
- A crime in which the victim is attacked first and then forced to pay money to stop further attacks
- Illegal entry to a computer system
- Impression created when we engage in various online activities,like browsing,communicating or uploading content
- A software that helps in preventing unauthorised access by blocking unsolicited communication
- The act of sending an email to an user misleading him to believe it is from a trusted person or source
- The receiver of the message is fooled into believing that the message is from a trusted source
16 Clues: Another name for Cybercriminals • Illegal entry to a computer system • A program that disrupts the normal functioning of a computer • The act of stealing and misusing someone's personal information • Any criminal activity using a computer and an internet connection • Use of illegal methods to get money from banks and their customers • ...
Browsing Safely 2025-06-02
Across
- The act of harassing or harming some using technology in a deliberate manner
- A program that disrupts the normal functioning of a computer
- A computer program designed to indentify,prevent and remove viruses from a computer
- Any criminal activity using a computer and an internet connection
- The act of stealing and misusing someone's personal information
- Used to conduct terrorism through computers and internet to cause fear and panic
- Use of illegal methods to get money from banks and their customers
Down
- Another name for Cybercriminals
- A collection of technologies and practices to protect computers from damage or unauthorised access
- The process of 'befriending' children on social media to facilitate online or physical sexual abuse.
- A crime in which the victim is attacked first and then forced to pay money to stop further attacks
- Illegal entry to a computer system
- Impression created when we engage in various online activities,like browsing,communicating or uploading content
- A software that helps in preventing unauthorised access by blocking unsolicited communication
- The act of sending an email to an user misleading him to believe it is from a trusted person or source
- The receiver of the message is fooled into believing that the message is from s trusted source
16 Clues: Another name for Cybercriminals • Illegal entry to a computer system • A program that disrupts the normal functioning of a computer • The act of stealing and misusing someone's personal information • Any criminal activity using a computer and an internet connection • Use of illegal methods to get money from banks and their customers • ...
Computer virus 2023-11-07
Across
- Is a type of malware that attaches to another program (like a document)
- Refers to all-encompassing threat protection designed to stop old-fashioned viruses as well as today’s malware threats
- Refers to early forms of cybersecurity software focused on stopping computer viruses
Down
- Aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats
- marksWhen people talk about “getting a virus” on their computer, they usually mean some form of malware—it could be a virus, computer worm, Trojan, ransomware or some other harmful thing.
- Not all ____are computer viruses
6 Clues: Not all ____are computer viruses • Is a type of malware that attaches to another program (like a document) • Refers to early forms of cybersecurity software focused on stopping computer viruses • Aren’t creating new viruses all the time, instead they focus their efforts on more sophisticated and lucrative threats • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-04-01
Across
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- How many blackheads does Bob have? [1]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- The type of notice incorporating links to where more detail can be found [2]
- the person in charge of ensuring the company complies with the PDPA [1]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- where can the exceptions to the Access Obligation be found? [1]
- What is the case setting out privacy notices can be used as the basis for consent? [2]
Down
- The form setting out a companies' purposes for CUD of PD [2]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
- the nature of the PDPA [2]
- Is there a difference between privacy notice and privacy policy? [1]
- What is the citation of Re Social Metric Pte Ltd? [2]
- Voluntary certification [3]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- The type of notice incorporating links to where more detail can be found [2]
- where can the exceptions to the Access Obligation be found? [1]
- Is there a difference between privacy notice and privacy policy? [1]
- Voluntary certification [3]
- The form setting out a companies' purposes for CUD of PD [2]
- the person in charge of ensuring the company complies with the PDPA [1]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
Down
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- What is the citation of Re Social Metric Pte Ltd? [2]
- the nature of the PDPA [2]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- How many blackheads does Bob have? [1]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
Technology 2023-06-07
Across
- represents text, computer processor instructions, or any other data using a two-symbol system
- is any software intentionally designed to cause disruption to a computer, server, client, or computer network
- is a commonly used method of lossy compression for digital images
- is a mobile operating system
- is the most important processor in a given computer.
- is a digital multimedia container format most commonly used to store video and audio
- is a mapping from some domain
- are small blocks of data created by a web server
Down
- is the protection of computer systems and networks
- is a method of transmitting and receiving messages using electronic devices
- is a hardware or software component
- is an American multinational technology company
- is a collection of discrete values that convey information
- is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs.
- is a proprietary audio/video interface for transmitting uncompressed video data and compressed or uncompressed digital audio data
- is a file format developed by Adobe
- is a bitmap image format that was developed by a team at the online services provider CompuServe
- is a form of computer memory that can be read and changed in any order
- is a coding format for digital audio developed largely by the Fraunhofer Society in Germany
19 Clues: is a mobile operating system • is a mapping from some domain • is a hardware or software component • is a file format developed by Adobe • is an American multinational technology company • are small blocks of data created by a web server • is the protection of computer systems and networks • is the most important processor in a given computer. • ...
Information Governance 2022-05-05
Across
- Ensuring timely and reliable access to and use of information
- Evidence of a business Activity
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- The process of adhering to policies and decisions
- Delegated responsibility for information management to appropriate individuals
- A measure of the extent to which an entity is threatened by a potential circumstance or event
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- The process of safeguarding important information from corruption, compromise or loss cybersecurity involves protecting that information by preventing, detecting, and responding to cyber attacks
- Ability of an organization to make its stakeholders accessible the information needed to make decisions
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
11 Clues: Evidence of a business Activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • A measure of the extent to which an entity is threatened by a potential circumstance or event • ...
Information Governance 2022-05-05
Across
- Ensuring timely and reliable access to and use of information
- Evidence of a business activity
- Information assets generated by or managed for the organization have a reasonable guarantee of authenticity and reliability
- The process of adhering to policies and decisions
- Delegated responsibility for information management to appropriate individuals
- A measure of the extent to which an entity is threatened by a potential circumstance or event
Down
- The final stage in the records lifecycle, resulting in destruction of temporary records or the transfer of permanent records to the Digital Archives
- The process of safeguarding important information from corruption, compromise or loss cybersecurity involves protecting that information by preventing, detecting, and responding to cyber attacks
- Ability of an organization to make its stakeholders accessible the information needed to make decisions
- Maintaining information assets for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements
- The electronic aspect of identifying, collecting and producing information in response to a request for production in a lawsuit or investigation
11 Clues: Evidence of a business activity • The process of adhering to policies and decisions • Ensuring timely and reliable access to and use of information • Delegated responsibility for information management to appropriate individuals • A measure of the extent to which an entity is threatened by a potential circumstance or event • ...
EMPOWER ME 2025-03-02
Across
- A collection of web pages accessible through a browser.
- A word processor that allows users to create, edit, and format text documents like letters, reports, and contracts with features like formatting options, tables, and images.
- desktop publishing application that helps you create visually rich, professional-looking publications.
- Designed for creating presentations with slides, making it the most likely answer for a crossword clue related to presentation tools.
- The practice of protecting systems, networks, and data from cyber threats, ensuring safe and secure online interactions.
Down
- Graphic visual representations of information, data, or knowledge intended to present information quickly and clearly.
- A set of guidelines for respectful and considerate online communication.
- Allows a large set or group of data to be stores, organized, analyzed, and interpreted automatically.
- A set of instructions, data or programs used to operate computers and execute specific tasks.
- A software program used to create spreadsheets and analyze data
- A website that contains a regularly updated journal or series of articles.
11 Clues: A collection of web pages accessible through a browser. • A software program used to create spreadsheets and analyze data • A set of guidelines for respectful and considerate online communication. • A website that contains a regularly updated journal or series of articles. • ...
Technology 2024-11-14
Across
- a part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- considered as a unit of memory size
- a unique name that identifies a website or other internet resource
- the state of being protected against the criminal or unauthorized use of electronic data
Down
- the machines, wiring, and other physical components of a computer or other electronic system
- the programs and other operating information used by a computer
- a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer
- small text files that websites send to a user's browser to store information about the user and their browsing activity
- the process of looking up information either on the Internet or in books
- a range of frequencies within a given band, in particular that used for transmitting a signal
- the process of converting information or data into a code, especially to prevent unauthorized access
11 Clues: considered as a unit of memory size • the programs and other operating information used by a computer • a unique name that identifies a website or other internet resource • the process of looking up information either on the Internet or in books • the state of being protected against the criminal or unauthorized use of electronic data • ...
xxx 2025-03-05
Across
- Symbolic color often associated with women's rights.
- The month International Women's Day is celebrated.
- UN Sustainable Development Goal to achieve gender equality and empower all women and girls.
- This number makes up the percentage of women in the cybersecurity workforce in Australia.
- The person in C&P team was born in Macedonia in Europe.
- The person in C&P team has two birds called Roki and Pipin.
- The woman who created the first computer program.
- Year 190_ women got the vote in Australia through The Commonwealth Franchise Act.
- The country where the idea of International Women’s Day was initiated.
- PwC’s network focused on gender equality.
- The person in C&P team played Nintendo gaming console as a child.
Down
- The person in C&P team has small disco lights at home and often will have a "dance off" on Friday afternoons with her kids to get into the mood for the weekend and celebrate the work week being done.
- International Women's Day's primary goal is to create this for women globally.
- The campaign theme for IWD 2025 is?
- Australia's first female Prime Minister.
- Gender _______; a key focus on closing the gap in opportunities.
- The interview series by PwC’s She’s Here in Cyber and Technology program is called “She’s Here to ...”
- Australia’s first International Women’s Day was held in 1928 in _____.
18 Clues: The campaign theme for IWD 2025 is? • Australia's first female Prime Minister. • PwC’s network focused on gender equality. • The woman who created the first computer program. • The month International Women's Day is celebrated. • Symbolic color often associated with women's rights. • The person in C&P team was born in Macedonia in Europe. • ...
Digital safety awareness 2022-11-29
Across
- something you access with a username and password
- prevent someone from contacting you
- a computer that is under the control of a malicious hacker without the knowledge of the computer owner
- an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer
- using a computer to gain unauthorized access to data in a system
- a trail of data you create while using the Internet
- a secret word or phrase that allows access to a phone, computer system or service
- taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- messages that try to trick you into providing sensitive information
- email that is not wanted
Down
- a program that is designed to harm a computer by deleting data
- event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data
- when a person is harassed, humiliated, or tormented online
- steps taken to protect a computer or computer system against unauthorized access or attack
- something that lasts forever
- malicious software designed to collect and transmit private information
- test commonly used by websites to verify the user is a real human and not a bot
- a type of software designed to block access to a computer system until a certain amount of money is paid
18 Clues: email that is not wanted • something that lasts forever • prevent someone from contacting you • something you access with a username and password • a trail of data you create while using the Internet • when a person is harassed, humiliated, or tormented online • a program that is designed to harm a computer by deleting data • ...
seatwork 2025-05-01
Across
- type that overlays digital elements on real-world objects (e.g., medical visuals).
- technology that projects light/images onto surfaces for interaction (e.g., virtual keyboards).
- measure that converts data into unreadable code.
Down
- disguised as legitimate software.
- type that uses QR codes or images to trigger digital content.
5 Clues: disguised as legitimate software. • measure that converts data into unreadable code. • type that uses QR codes or images to trigger digital content. • type that overlays digital elements on real-world objects (e.g., medical visuals). • technology that projects light/images onto surfaces for interaction (e.g., virtual keyboards).
Cybersecurity Awareness Month Crossword Puzzle 2024-09-20
Across
- Unauthorized attempt or access to an information system.
- A type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- The practice of spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.
Down
- The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- The practice of protecting systems, networks, and programs from digital attacks.
- A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system.
- Faking the sending address of a transmission to gain illegal entry into a secure system.
- A weak spot in a computer system, which can be used to attack this system.
- Unauthorized user who attempts to or gains access to an information system.
- A type of malware that is aimed to infect and harm a file, a system, or a network.
10 Clues: Unauthorized attempt or access to an information system. • A weak spot in a computer system, which can be used to attack this system. • Unauthorized user who attempts to or gains access to an information system. • The practice of protecting systems, networks, and programs from digital attacks. • ...
Cybersecurity Awareness Month at BFB 2022-09-26
Across
- A tool that allows the user the user to remain anonymous while using the internet by masking the location and encrypting traffic (e.g: Cato)
- Storing your _______ in a plain text file is not a good idea
- October is Awareness Month for this
- Using the human tendency to trust to manipulate people to gain sensitive information.
- A harmful software meant to disable, infect or allow hackers to access the user's computer
- 123456 and MyDOB01012010 are examples of what kind of Password?
Down
- Criminals pose as bank staff or other employees on the PHONE to try to trick you into sharing information.
- An __________ use policy is a set of rules and guidelines that specify appropriate use of computer systems or networks.
- The process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerad as a trustworthy entity.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
10 Clues: October is Awareness Month for this • Storing your _______ in a plain text file is not a good idea • 123456 and MyDOB01012010 are examples of what kind of Password? • Using the human tendency to trust to manipulate people to gain sensitive information. • A harmful software meant to disable, infect or allow hackers to access the user's computer • ...
Cybersecurity Awareness - Security at Home 2025-09-26
Across
- The process of identifying, evaluating, and prioritizing risks to organizational assets.
- Protection of devices like laptops, desktops, and mobile phones from cyber threats.
- Determines what an authenticated user is allowed to do within a system.
- is a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
- A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
- A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
Down
- Routine practices and steps users take to maintain system health and improve security.
- A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
- Manipulating people into divulging confidential information or performing actions that compromise security.
- Mechanisms that restrict access to systems, data, and resources based on user roles and permissions.
10 Clues: Determines what an authenticated user is allowed to do within a system. • Protection of devices like laptops, desktops, and mobile phones from cyber threats. • Routine practices and steps users take to maintain system health and improve security. • The process of identifying, evaluating, and prioritizing risks to organizational assets. • ...
Trends in Healthcare Crossword Puzzle 2019-09-16
Across
- prevents illness and disease
- recycling and turning off electronics are examples of energy _______________
- refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other
- _________ medicine promotes physical, emotional, social, intellectual, and spiritual well-being
- baby ________ are individuals born between 1946 and 1964, which has created an increased population of aging adults and increased need for geriatric medicine
- home _________ allows patient to be in the comfort of his or her own home
- the action or process of combining a number of things into a single more effective or coherent whole
Down
- less expensive than inpatient care
- everyone with the same ____________ is in one payment group as a method of cost containment
- improves mood, overall physical and mental wellness, improves stamina, immune system function, and releases endorphins
- the protection or promotion of the interests of consumers.
- therapy, massage, breathing techniques and yoga are all examples of ______ management
- is the protection of internet-connected systems, including hardware, software and data, from cyberattacks
- health related ____________ are one of the main reasons for high costs of healthcare
- physical, social, intellectual, spiritual, emotional, occupational, financial, and environmental are all examples of this
- general direction in which something is developing or changing
16 Clues: prevents illness and disease • less expensive than inpatient care • the protection or promotion of the interests of consumers. • general direction in which something is developing or changing • home _________ allows patient to be in the comfort of his or her own home • recycling and turning off electronics are examples of energy _______________ • ...
Science and Technology Terms 2023-05-05
Across
- - A type of AI that allows machines to learn and improve from experience without being explicitly programmed.
- - Facts or statistics gathered for analysis or reference.
- - The branch of technology that deals with the design, construction, operation, and application of robots.
- - Global system of interconnected computer networks.
- - The process of converting information or data into a code to prevent unauthorized access.
- - A system of signals, letters, or symbols used to represent information.
- - The use of living organisms, cells, or biological processes to develop products or services.
- - Relating to or based on quantum mechanics.
Down
- - A computer-generated simulation of a 3D environment that can be interacted with in a seemingly real way.
- - The study and application of extremely small things.
- - The delivery of computing services—including servers, storage, databases, networking, software, and analytics—over the Internet.
- - The practice of protecting computer systems and networks from digital attacks.
- - A set of rules or procedures used for solving a problem or accomplishing a task.
- - Large sets of structured and unstructured data that can be analyzed to reveal patterns, trends, and associations.
- - The standard markup language used for creating web pages and web applications.
- - A system that uses satellite signals to determine the precise location of a device.
16 Clues: - Relating to or based on quantum mechanics. • - Global system of interconnected computer networks. • - The study and application of extremely small things. • - Facts or statistics gathered for analysis or reference. • - A system of signals, letters, or symbols used to represent information. • ...
25 2024-01-05
Across
- The activity of setting up a business or businesses, taking on financial risks in the hope of profit.
- The practice of protecting systems, networks, and programs from digital attacks.
- The use of living systems and organisms to develop or make useful products.
- Data Extremely large data sets that may be analyzed computationally to reveal patterns, trends, and associations.
- The use of largely automatic equipment in a system of operation.
- Capable of being decomposed by bacteria or other living organisms.
Down
- The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature.
- Working from home, making use of the Internet, email, and the telephone.
- The branch of technology that deals with dimensions and tolerances of less than 100 nanometers.
- The ability to be maintained over the long term without harming the environment. (Note: Repeated for variety.)
- Capable of being maintained or continued over the long term.
- Reality An enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device.
12 Clues: Capable of being maintained or continued over the long term. • The use of largely automatic equipment in a system of operation. • Capable of being decomposed by bacteria or other living organisms. • Working from home, making use of the Internet, email, and the telephone. • The use of living systems and organisms to develop or make useful products. • ...
Cross Word Puzzle - Cyber Security 2023-10-12
Across
- the gaining of unauthorised access to data in a system or computer
- a type of software program created to protect information technology systems and individual computers from malicious software or malware
- the practice of protecting systems, networks and programs from digital attacks
- a type of malware that spreads between computers and damages data and software
- a string of characters that allows access to a computer system or service
- software that is specifically designed to disrupt, damage or gain unauthorised access to a computer
- malware that misleads users of its true intent by disguising itself as a standard program
Down
- the protection of personal data from those who should not have access to it
- individuals or teams of people who use technology to commit malicious activities on digital systems or networks
- the actual person or organisation who is directly affected by the hacker's use of stolen data or information
- a security system designed to prevent unauthorised access into or out of a computer network
- a system that connects two or more computer devices for transmitting and sharing information
12 Clues: the gaining of unauthorised access to data in a system or computer • a string of characters that allows access to a computer system or service • the protection of personal data from those who should not have access to it • the practice of protecting systems, networks and programs from digital attacks • ...
Network Security Crossword 2022-07-21
Across
- any piece of software, malicious or not, that displays advertisements on a computer.
- malware that threatens to publish the victims personal data, block access to the computer, unless a ransom is paid.
- malicious software that aims to gather information about a person or organisation.
- a cyberattack that redirects a website’s traffic to another, fake site by installing malware on the computer.
- software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
- A person who gains unauthorised access to computer files or networks in order to further social or political ends.
Down
- The practice of protecting system, networks and programs from digital attacks
- A person who uses computers to gain unauthorised access to data.
- malware that replicates itself in order to spread to other computers.
- logging what keys people have tapped on the keyboard
- programs which users are tricked into installing under the pretence that they are legitimate and useful.
- A computer program which is hidden within another program (the ‘host’ program). the virus code is only run when the host program is executed.
12 Clues: logging what keys people have tapped on the keyboard • A person who uses computers to gain unauthorised access to data. • malware that replicates itself in order to spread to other computers. • The practice of protecting system, networks and programs from digital attacks • malicious software that aims to gather information about a person or organisation. • ...
Business Continuity Awareness Week 2022 2022-07-04
Across
- One of major paradigm shift in the workforce.
- What is the latest overseas company that has completed their BCMS Implementation as per the latest post in BCM's Yammer page?
- The biggest threat to Cybersecurity is human _______
- In order to prepare for cyber resilience, speed and agility are required.
- The capacity to recover quickly from difficulties
- Effectively manages _________ via regular updates to the Board, regulators, local authorities, government representatives and the media is one of the CMT Chairman roles and responsibilities
- One of hybrid Pros and Cons is reliance on home utilities and ___________
- Increase the UMW Group’s competency and autonomy in order to be self-reliant and responsible for the business resilience matters as an inherent organizational culture
- What is the third UMW Group BCM risk events
Down
- Group CMT Members’ ‘Rose Among the Thorns’
- __________clearly to build a success for program in microsimulations.
- Acknowledge new _________ in addition to the opportunities that hybrid world provides businesses and employees.
- In rational Choice Theory, what comes after interests and beliefs about opportunities and outcomes
- A thing made by combining two different elements
- What app can WOWriors get more information about Business Continuity and Organisational Resilience from UMW Office 365?
- Involvement and enthusiasm in resilience
16 Clues: Involvement and enthusiasm in resilience • Group CMT Members’ ‘Rose Among the Thorns’ • What is the third UMW Group BCM risk events • One of major paradigm shift in the workforce. • A thing made by combining two different elements • The capacity to recover quickly from difficulties • The biggest threat to Cybersecurity is human _______ • ...
Enteprise 2025-08-11
Across
- Liability Insurance – Insurance coverage protecting against financial losses from cyber incidents.
- Intelligence (BI) – Tools and processes that analyse data to help organisations make informed decisions.
- cloud – Cloud services deployed across multiple locations but managed from a central provider.
- Automation – Using AI, machine learning, and robotic process automation to automate complex tasks.
- Mesh – A flexible, modular approach to security where controls are distributed across different systems.
- Immune System (DIS) – Integrated systems designed to detect, prevent, and recover from digital threats.
- Detection and Response (EDR) – Security tools that monitor, detect, and respond to threats on devices.
- – Creating digital interactions across multiple devices, touchpoints, and platforms seamlessly.
Down
- Authentication (MFA) – A login process requiring two or more verification methods for security.
- (XaaS) – Delivering all types of IT services over the internet on a subscription basis.
- Intelligence (AI) – Machines or software that can perform tasks requiring human-like intelligence.
- Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies.
- technology – Tech designed to reduce environmental impact and promote long-term ecological balance.
- – A persistent, virtual 3D space where people can interact, work, and play.
- Screening – Scanning systems to detect security weaknesses before they can be exploited.
- Computing – Computers that use quantum bits (qubits) to solve problems faster than classical computers.
16 Clues: Reality (XR) – An umbrella term for VR, AR, and mixed reality technologies. • – A persistent, virtual 3D space where people can interact, work, and play. • (XaaS) – Delivering all types of IT services over the internet on a subscription basis. • Screening – Scanning systems to detect security weaknesses before they can be exploited. • ...
Browsing safely 2025-06-08
Across
- ______ is a popular anti-virus.
- It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- ____ also known as unethical hacker.
- It refer to the act of stealing and misusing someone's personal Plus information.
- Standard form of vital information resources under seize.
- It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- Never share your ____ while chatting.
- A ____ is a software that help in preventing unauthorised access to your computer.
- It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- It is an act ab harming or harassing using information technology in deliberate manner.
- _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- ____ means hoaxing or misleading.
- It referred to an illegal entry into a computer system or network.
- It is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation.
16 Clues: ______ is a popular anti-virus. • ____ means hoaxing or misleading. • ____ also known as unethical hacker. • Never share your ____ while chatting. • Standard form of vital information resources under seize. • It referred to an illegal entry into a computer system or network. • It refer to the act of stealing and misusing someone's personal Plus information. • ...
Cybersecurity Awarness - Security at Home 2025-10-08
Across
- A system that aggregates and analyzes security data from across an organization to detect threats and support incident response.
- Security intended to protect devices like laptops, desktops, and mobile phones.
- Routine practices and steps users take to maintain system health and improve security.
- A Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system.
Down
- The process of identifying, evaluating, and prioritizing risks to organizational assets.
- Mechanisms that restrict access to systems, data, and resources.
- Manipulating people into divulging confidential information or performing actions that compromise security.
- A vulnerability that is unknown to the vendor and has no patch available, often exploited quickly by attackers.
- A weakness in a system or application that can be exploited by attackers to gain unauthorized access or cause damage.
- Determines what an authenticated user is allowed to do within a system.
10 Clues: Mechanisms that restrict access to systems, data, and resources. • Determines what an authenticated user is allowed to do within a system. • Security intended to protect devices like laptops, desktops, and mobile phones. • Routine practices and steps users take to maintain system health and improve security. • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- The type of notice incorporating links to where more detail can be found [2]
- How many blackheads does Bob have? [1]
- The form setting out a companies' purposes for CUD of PD [2]
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- Voluntary certification [3]
- What is the citation of Re Social Metric Pte Ltd? [2]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
Down
- where can the exceptions to the Access Obligation be found? [1]
- the nature of the PDPA [2]
- the person in charge of ensuring the company complies with the PDPA [1]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- Is there a difference between privacy notice and privacy policy? [1]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- What is the citation of Re Social Metric Pte Ltd? [2]
- Is there a difference between privacy notice and privacy policy? [1]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- where can the exceptions to the Access Obligation be found? [1]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- the nature of the PDPA [2]
- The form setting out a companies' purposes for CUD of PD [2]
Down
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- Voluntary certification [3]
- How many blackheads does Bob have? [1]
- : One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- The type of notice incorporating links to where more detail can be found [2]
- the PDPA [1]
14 Clues: the PDPA [1] • the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
PDPL AMAZING BEST SUPER CROSSWORD 2021-03-31
Across
- What is the case setting out privacy notices can be used as the basis for consent? [2]
- Voluntary certification [3]
- This is one of the essential services under the first schedule of the CyberSecurity Act [3]
- where can the exceptions to the Access Obligation be found? [1]
- Is there a difference between privacy notice and privacy policy? [1]
Down
- the person in charge of ensuring the company complies with the PDPA [1]
- the nature of the PDPA [2]
- What is the citation of Re Social Metric Pte Ltd? [2]
- The form setting out a companies' purposes for CUD of PD [2]
- How many blackheads does Bob have? [1]
- The type of notice incorporating links to where more detail can be found [2]
- What is the Phase number of the step "Create Action Plan" in the Data Protection Impact Assessment [3]
- One technical measure an organisation may use to protect personal data is using the right level of email security _____ when sending or receiving confidential emails [3]
- the definition of ____ ____ under s 2(1) of the PDPA is "the means for determining suitability, eligibility or qualifications of the individual to whom the data relates for employment or for appointment to office". [2]
14 Clues: the nature of the PDPA [2] • Voluntary certification [3] • How many blackheads does Bob have? [1] • What is the citation of Re Social Metric Pte Ltd? [2] • The form setting out a companies' purposes for CUD of PD [2] • where can the exceptions to the Access Obligation be found? [1] • Is there a difference between privacy notice and privacy policy? [1] • ...
Test your Knowledge of IEEE's Initiatives 2022-06-10
Across
- Launched in 2019 to position IEEE at the center of Digital Transformation
- Launched in 2014 to provide the go-to online presence for security and privacy (S&P) professionals
- Conceptualized and led under the direction of Wanda Reder, former President of the IEEE Power & Energy Society, in 2011
Down
- Initially launched in December 2016 to reflect IEEE's contribution to current and future generations of networking
- Launched in 2019 as IEEE's leading community for all projects and activities on quantum technologies
- Connects IEEE members with other organizations and agencies that foster global efforts to share knowledge and discoveries in neuroscience and neural engineering
- Initiative approved effective January 1, 2018 by the IEEE Future Directions Committee
7 Clues: Launched in 2019 to position IEEE at the center of Digital Transformation • Initiative approved effective January 1, 2018 by the IEEE Future Directions Committee • Launched in 2014 to provide the go-to online presence for security and privacy (S&P) professionals • ...
FITDVocab.TS 2013-05-15
Across
- a presentation creator
- A portable electronic device
- the place where you plug in your flash drive
- geo=world
- an online server that stores files and documents
- brain of your computer
- something that holds your data on your computer
- Internet service provider
- the way you behave online
- A dedicated computer set up for one or more purposes
- protection of information and networks
- promoting your product
- the computer screen or monitor
- A hardware input device
- The place on your computer where you put in CDs
- a device connected to the computer
- used to enter instructions into a computer
- electronic
- computer wiring
- online or having to do with the internet
- putting data into a computer
- service set identifier
- 3g 4g
- commonly used to connect to local networks
- Data sent out of the computer
Down
- wireless fidelity
- legally owning something
- Mountain Lion OSX
- heart of the computer
- guidelines for a document
- smartphone screen
- encoded computer instructions
- 8 of them equal a byte
- Computer apps
- restart your computer to refresh it
- a brief history of your background
- getting people to by your product
- 1000 bytes
- the place where you plug in your headphones
- extension cord
- short term memory
- a small object that stores all of your data
- DSL Cable
- long term memory
- a hands free communicating device
45 Clues: 3g 4g • geo=world • DSL Cable • 1000 bytes • electronic • Computer apps • extension cord • computer wiring • long term memory • wireless fidelity • Mountain Lion OSX • smartphone screen • short term memory • heart of the computer • a presentation creator • brain of your computer • 8 of them equal a byte • promoting your product • service set identifier • A hardware input device • legally owning something • ...
TECHNOLOGY VOCABULARY 2021-02-11
Across
- the application of scientific discoveries for practical purposes, especially in industry.
- suppressing or stopping certain information being available to the public.
- an image, video or piece of information that becomes very popular very quickly on the internet.
- the programmes and other operating information used by a computer and related devices.
- important development or discovery.
- a person who fears or dislikes new technology especially computers, and does not want to use it.
- to develop towards an improved or more advanced state.
- a person who is enthusiastic about new technology.
Down
- a very small piece of silicon with electronic circuits on it that can hold large quantities of information or perform mathematical and logical operations.
- out of date; old-fashioned.
- the effect of something.
- portable computer.
- a small mechanical or electronic device or tool, often ingenious, novel or fun as well as being useful.
- a book published in digital form and read on a computer or other dedicated electronic device.
- – a thing made or adapted for a particular purpose especially a piece of mechanical or electronic equipment. It is usually quite small.
- a person who illegally gains access to a computer system to steal information or tamper with the system.
- typically a piece of electrical equipment, such as a kettle or toaster, that uses less advanced technology.
- the measures taken to protect against the criminal or unauthorised access of electronic data.
- the process of developing something.
- using or involving advanced technology.
20 Clues: portable computer. • the effect of something. • out of date; old-fashioned. • important development or discovery. • the process of developing something. • using or involving advanced technology. • a person who is enthusiastic about new technology. • to develop towards an improved or more advanced state. • ...
Survival Game 2021-01-05
Across
- What was the original name for Windows
- Reorganising a business to reduce capacity and increase efficiency
- Which major file hosting service is blocked/banned in China
- Obtaining the materials and parts needed to produce a product
- This technique is very greedy but helps us to find our shortest way
- Which engineer sketched plans for one of the earliest known robots
- How do you greet a piece of wood? Think Operations!
- What tech-related day is celebrated on the 30th of November
- A small square can tell a lot about you if you scan it well
- Computer Industries are an example of ------------------------- manufacturing
- A measure of the success of an operation in converting inputs to outputs
Down
- The term implies that disparate computers, information databases, and communications networks are integrated
- What do you say when you are trying to find your home? Think Operations!
- The level of activity or output that an operation (facility or organization) can achieve in a given period of time under normal working conditions
- to implement an appropriate level of cybersecurity across the supply chain of the defense industrial base
- The direction and scope of an organization over the long term
- a process of generating and manipulating product designs through computer software
- Set of security policies to screen incoming and outgoing messages
- Basic connectivity test between two TCP/IP network devices
- standard that establishes concrete information security standards for use by data centers and other organizations
20 Clues: What was the original name for Windows • How do you greet a piece of wood? Think Operations! • Basic connectivity test between two TCP/IP network devices • Which major file hosting service is blocked/banned in China • What tech-related day is celebrated on the 30th of November • A small square can tell a lot about you if you scan it well • ...
TSA Middle School Events 2024-08-18
Across
- Students design, build, and race solar-powered model cars in this event.
- A knowledge-based competition focused on questions related to technology.
- In this event, students design eco-friendly homes that operate off the electrical grid.
- A hands-on event where students work with electrical circuits and systems.
- Teams apply mechanical engineering principles to solve real-world problems.
- A middle school competition where students create computer programs to solve problems.
- An event that challenges students to explore innovations in the medical field.
- Students create products efficiently using mass production techniques in this competition.
- Students design, build, and fly model aircraft in this competition.
- In this event, students design and race CO2-powered cars.
Down
- Teams create animated videos to explain STEM concepts and ideas.
- An event where students create technical drawings using computer-aided design software.
- Students learn and apply knowledge about internet security and online safety in this event.
- A competition where students demonstrate knowledge of STEM careers and job-seeking skills.
- Students create interactive video games to solve a specific challenge or tell a story.
- Teams work together to analyze crime scenes and solve forensic puzzles.
- A TSA event focusing on the use of technology in biology and life sciences.
- A team-based competition where students solve real-world problems under time constraints.
- A competition where students design a complex machine to perform a simple task.
- A competition where students capture and edit digital photographs to meet a specific theme.
20 Clues: In this event, students design and race CO2-powered cars. • Teams create animated videos to explain STEM concepts and ideas. • Students design, build, and fly model aircraft in this competition. • Teams work together to analyze crime scenes and solve forensic puzzles. • Students design, build, and race solar-powered model cars in this event. • ...
Nested Drone Crossword Puzzle 2024-11-11
Across
- - Aerodyne’s AI-driven analytics platform.
- - Company with a drone achieving over 21 hours of flight.
- - Service using drones for disaster response and firefighting.
- - Technology for self-guided take-off, landing, and charging.
- - Notice published to address air risk in drone operations.
- - Component managing drone operations on the ground.
- - Drone type allowing flexible and mobile operation.
- - Communication center essential for safe drone navigation.
- - Autonomous drone system for return to base.
- - Chinese company specializing in drone charging.
- - Company offering solutions like Monitoring and Cargo Hubs.
- - Berlin-based company producing charging pads for drones.
- - Field benefiting from drones for inventory checks.
- - Network type enhancing data transmission for drones.
- - Real-time data exchange with ATC during drone missions.
- - Charging system designed for DJI drones.
Down
- - Company model achieving 27+ hours of flight.
- - Industry using drones for site surveying and mapping.
- - Device reducing ground risk in emergencies.
- - Security application using drones for awareness and detection.
- - Management system where drones monitor congestion.
- - Traditional inspection method, costly compared to drones.
- - Foreign airspace control issues faced in early drone programs.
- - Safer area recommendation for drone flights.
- - Inspection task performed by drones in long-distance monitoring.
- - Early USAF drone technology program from the 1970s.
- - Sector monitoring turbines and power lines with drones.
- - Critical challenge in drone technology adoption.
- - Drone configuration offering limited flexibility but continuous flight.
- - Cloud-based platform in Aerodyne's drone solutions.
30 Clues: - Aerodyne’s AI-driven analytics platform. • - Charging system designed for DJI drones. • - Device reducing ground risk in emergencies. • - Autonomous drone system for return to base. • - Company model achieving 27+ hours of flight. • - Safer area recommendation for drone flights. • - Chinese company specializing in drone charging. • ...
Grade 5 2024-10-21
Across
- Websites where you can watch videos or listen to music.
- Finding out if information is false.
- A process or set of rules for solving a problem.
- The process of converting information into a code to keep it safe.
- Tricking people into giving personal information.
- Controlling the information you leave online.
- Checking if someone is really who they say they are.
- Online accounts pretending to be someone else.
- When information is stolen from a company or website.
Down
- Tools to work with others over the internet.
- Spending too much time on social media.
- Responsible use of technology and the internet.
- Managing how long you use a device.
- Rules you agree to before using a website.
- A security step that uses two methods to log in.
- A trick to get you to share personal information.
- A system to block unauthorized access to a network.
- Protecting devices and networks from attacks.
- A tool to keep your internet activity private.
- Items bought within an app.
- Passwords that are hard to guess.
- Dangers of using Wi-Fi networks that are not secure.
- Being online without sharing your identity.
- Small files saved on your computer to track websites you visit.
- A tool to stop ads from showing on websites.
25 Clues: Items bought within an app. • Passwords that are hard to guess. • Managing how long you use a device. • Finding out if information is false. • Spending too much time on social media. • Rules you agree to before using a website. • Being online without sharing your identity. • Tools to work with others over the internet. • A tool to stop ads from showing on websites. • ...
civil law in the digital age 2024-03-12
Across
- A decentralized digital ledger that records transactions.
- dispute resolution Methods of resolving disputes using technology.
- The buying and selling of goods and services via the internet.
- A formal written law passed by a legislature.
- A right granted for an invention.
- Legal responsibility for one’s actions.
- The process of identifying, preserving, collecting, and producing electronically stored information.
- Technology that mimics human intelligence processes.
- The act of ensuring compliance with laws.
- Monetary compensation awarded for harm.
- An electronic method of signing documents.
- Laws enacted by government.
- property Creations of the mind protected by law.
- A statement that describes how personal information is collected, used, and shaed.
- The party who brings a lawsuit.
Down
- The practice of protecting systems from digital attacks.
- An agreement enforceable by law.
- Small pieces of data stored on a user’s device.
- Protection of original works.
- A legal case that establishes a principle or rule.
- Civil wrong not arising from contract.
- Rules and guidelines for using digital platforms.
- The authority to decide cases in court.
- Laws designed to protect personal data.
- A recognizable sign or expression used by a business.
- The principle that internet service providers should treat all data on the internet equally.
- names Internet addresses used to identify websites.
- The party against whom a lawsuit is brought.
- The right to keep personal information confidential.
- The process of taking legal action.
30 Clues: Laws enacted by government. • Protection of original works. • The party who brings a lawsuit. • An agreement enforceable by law. • A right granted for an invention. • The process of taking legal action. • Civil wrong not arising from contract. • The authority to decide cases in court. • Laws designed to protect personal data. • Legal responsibility for one’s actions. • ...
civil law in the digital age 2024-03-12
Across
- A decentralized digital ledger that records transactions.
- dispute resolution Methods of resolving disputes using technology.
- The buying and selling of goods and services via the internet.
- A formal written law passed by a legislature.
- A right granted for an invention.
- Legal responsibility for one’s actions.
- The process of identifying, preserving, collecting, and producing electronically stored information.
- Technology that mimics human intelligence processes.
- The act of ensuring compliance with laws.
- Monetary compensation awarded for harm.
- An electronic method of signing documents.
- Laws enacted by government.
- property Creations of the mind protected by law.
- A statement that describes how personal information is collected, used, and shaed.
- The party who brings a lawsuit.
Down
- The practice of protecting systems from digital attacks.
- An agreement enforceable by law.
- Small pieces of data stored on a user’s device.
- Protection of original works.
- A legal case that establishes a principle or rule.
- Civil wrong not arising from contract.
- Rules and guidelines for using digital platforms.
- The authority to decide cases in court.
- Laws designed to protect personal data.
- A recognizable sign or expression used by a business.
- The principle that internet service providers should treat all data on the internet equally.
- names Internet addresses used to identify websites.
- The party against whom a lawsuit is brought.
- The right to keep personal information confidential.
- The process of taking legal action.
30 Clues: Laws enacted by government. • Protection of original works. • The party who brings a lawsuit. • An agreement enforceable by law. • A right granted for an invention. • The process of taking legal action. • Civil wrong not arising from contract. • The authority to decide cases in court. • Laws designed to protect personal data. • Legal responsibility for one’s actions. • ...
Crossword 2025-10-11
Across
- Innovation protecting digital memories and data
- Virtual universe combining social media and gaming
- 3D projection technology used in futuristic displays
- Worn gadget that tracks health and time
- Style that brings old trends into modern fashion
- Short message service before phones and the internet
- Innovation that enabled global communication and GPS
- Innovation that lets users experience virtual worlds
- Machine that builds real objects layer by layer
- Phone that needed you to rotate a wheel to call
- Old storage medium replaced by pen drives
- Captured moments before digital cameras were invented
- Innovation that replaced buttons with gestures
- Used to receive short messages before mobile phones
- Instant photo camera making a modern comeback
- Wireless technology replacing cables and cords
Down
- Type of computing representing the next tech revolution
- Magnetic tape used to record songs before CDs
- Used to record songs before MP3 players
- Symbol of modern innovation and automation
- Machine used for typing before computers arrived
- Place filled with classic coin-operated games
- Gadget that replaced cameras, radios, and watches
- Device once used for music and news before TV became popular
- Portable player that let people listen to tapes on the go
- Flying innovation used for photography and delivery
- Classic music record loved by collectors even today
- The biggest innovation that connected the whole world
- Technology that mimics human intelligence
- Modern data storage replacing hard drives
30 Clues: Used to record songs before MP3 players • Worn gadget that tracks health and time • Old storage medium replaced by pen drives • Technology that mimics human intelligence • Modern data storage replacing hard drives • Symbol of modern innovation and automation • Magnetic tape used to record songs before CDs • Place filled with classic coin-operated games • ...
Name: _______________________ 2025-09-30
Across
- An attempt by hackers to damage or gain unauthorized access to your computer or network.
- The process of proving who you are, like using a password or fingerprint.
- A program you use to access the internet (like Chrome or Safari).
- A copy of important data stored separately to protect against data loss.
- Software that helps protect your computer from viruses by detecting and removing them.
- _________ AUTHENTICATION - A security process that requires two or more forms of identification to access data.
- (2 words) A tool that helps you create and store strong passwords securely.
- (2 words)When sensitive information is accessed without permission.
Down
- The practice of protecting computers, networks, and data from unauthorized access or attacks.
- (2 words)When someone steals your personal information to commit fraud.
- (2 words)Tricks used by hackers to manipulate people into giving away confidential information.
- : The method of converting information into a code to prevent unauthorized access.
- Malware that locks your files and demands payment to unlock them.
- : A scam where attackers send fake emails to trick you into providing personal information.
- : Someone who tries to gain unauthorized access to computers or networks.
- Malicious software designed to harm or exploit computers.
- Small data files stored on your computer by websites to remember your preferences.
- : A secret word or phrase used to access a computer or service.
- : A security system that controls incoming and outgoing network traffic.
- : Unwanted or junk email.
20 Clues: : Unwanted or junk email. • Malicious software designed to harm or exploit computers. • : A secret word or phrase used to access a computer or service. • A program you use to access the internet (like Chrome or Safari). • Malware that locks your files and demands payment to unlock them. • (2 words)When sensitive information is accessed without permission. • ...
Typing, Tech Tools & Ethical AI Review 2025-10-15
Across
- Small chip inside the CPU that executes instructions
- The brain of the computer that processes instructions
- Moral principles guiding responsible AI use
- Supply Supplies power to all components
- Artificial Intelligence that mimics human intelligence
- Keys Key used to move the cursor to a set position on a line
- Creating spreadsheets for data and calculations
- A key that modifies the function of other keys
- Temporary memory used for quick access during tasks
- Note-taking and reminders
- Harmful software designed to damage devices
- The keys where your fingers rest to start typing
- Words per minute, a measurement of typing speed
- Protection of personal information from misuse
- Word processing and document creation
- The main board connecting all parts
- Devices Devices like monitor and printer to show results
- Unfair preference or prejudice in AI decisions
- Fake emails or messages used to steal info
Down
- Protecting your information and devices online
- Using technology responsibly and respectfully
- Keys programmed for special system or app actions
- Classroom assignments and communication
- Devices Devices like keyboard and mouse to send commands
- Key used for typing capital letters
- Clear explanation of how AI makes decisions
- Making presentations with slides
- Physical harm from repeated hand movements on devices
- Using technology to bully or harass others
- Online file storage and organization
- Sending and receiving emails
- Creating surveys and quizzes
- A secret code to protect your accounts
- Permanent storage for files and programs
34 Clues: Note-taking and reminders • Sending and receiving emails • Creating surveys and quizzes • Making presentations with slides • Key used for typing capital letters • The main board connecting all parts • Online file storage and organization • Word processing and document creation • A secret code to protect your accounts • Supply Supplies power to all components • ...
THE BIG C PROGRAM 2020-07-11
Across
- One of the Big C focus account who recently appointed Sanker Parameswaran as an Additional Director (Independent and Non-Executive) of the Company
- Which sector has highest number of focus accounts under the Big C programme?
- Periodic reviews at RC leadership level will measure this
- A different service group(Non RC) from which 15 accounts have been considered under the Big C program.
- Identify the RC focus solution under the Big C program.
- This sector contributed to 26% of the RC NFR
- How many accounts are covered under the Big C program?
Down
- One of the key asks from the RC PD Group
- Mention the number of RC focus accounts covered under the Big C Program.
- One of the objectives of the Big C programme - Building deeper ______________ Relationships
- One of the five focus sectors covered under the Big C program.
- Data privacy is the focus solution for this sector –
- Name the big C focus account covered under Consumer Markets sector.
- Under this programme how many non RC accounts do we ensure presense in?
- In which month did Akhilesh launch Super 100s? (An initiative under Big C program where 100 chosen RC M/AD will lead the development of Big C – 100 selected clients)
15 Clues: One of the key asks from the RC PD Group • This sector contributed to 26% of the RC NFR • Data privacy is the focus solution for this sector – • How many accounts are covered under the Big C program? • Identify the RC focus solution under the Big C program. • Periodic reviews at RC leadership level will measure this • ...
DATA SECURITY 2025-10-22
Across
- A virtual barrier that keeps unauthorized users out of a computer network.
- A secret word or phrase that grants you access to an account or device.
- A small text file saved by a website to your computer that remembers information about you.
- Harmful software that can copy itself and spread to other computers, often deleting or damaging data.
- A set of rules for how you should behave and interact online.
- The record of everything you do and post online; it stays forever!
Down
- A type of software designed to damage, disable, or gain unauthorized access to a computer system.
- A crime where someone steals your personal information to pretend to be you.
- This type of software protects your computer from viruses and other malicious programs.
- The practice of protecting systems, networks, and data from digital attacks.
- A fake message, often an email, trying to trick you into giving away private information.
- A special way to scramble data so only authorized people can read it.
- The general term for information, like facts, statistics, or files.
- Using two different ways to prove you are who you say you are before logging in. (Abbreviation)
14 Clues: A set of rules for how you should behave and interact online. • The record of everything you do and post online; it stays forever! • The general term for information, like facts, statistics, or files. • A special way to scramble data so only authorized people can read it. • A secret word or phrase that grants you access to an account or device. • ...
Cybersecurity Awareness Month Crossword 1 2023-10-04
Across
- What system are we using to make logging in more secure than passwords?
- What you should do if you are unsure of, or see a suspicious email.
- An email attempting to get you to reveal information, often with an urgent tone.
- _Phishing A type of phishing campaign that targets a specific person or group.
- A type of malicious software designed to block access to a computer system until a sum of money is paid.
Down
- The act of making an email look like it's coming from a legitimate or trusted source.
- Software that is specifically designed to disrupt, damage, or gain unauthorized access.
- _-backing The act of following someone into a secured area after they've used their badge.
- _Engineering The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- What you should always do with your mouse before clicking a link.
10 Clues: What you should always do with your mouse before clicking a link. • What you should do if you are unsure of, or see a suspicious email. • What system are we using to make logging in more secure than passwords? • _Phishing A type of phishing campaign that targets a specific person or group. • ...
Safety & Security Day: Cybersecurity 1 2025-07-25
Across
- System to request an exception to use Canva for a marketing project.
- Action taken when uploading confidential data to ChatGPT.
- Mandatory connection method for remote access to Maxis systems.
- A secret word used to access an account.
- Software that harms your computer.
- Protects your computer from viruses and attacks.
- Sensitivity Labeling : An engineer needs to share network drawings and site maintenance schedules with an authorized contractor.
Down
- Making data unreadable to unauthorised people.
- Sensitivity Labeling : A Maxis employee is sending document includes internal cost assessments and timelines.
- Sensitivity Labeling : Ali needs to send his payslip to his personal email.
10 Clues: Software that harms your computer. • A secret word used to access an account. • Making data unreadable to unauthorised people. • Protects your computer from viruses and attacks. • Action taken when uploading confidential data to ChatGPT. • Mandatory connection method for remote access to Maxis systems. • ...
Social Engineering Attacks 2023-08-14
Across
- A type of social engineering attack in which the attacker promises the victim a favor in exchange for information or other benefits (Latin for "something for something"
- Used in the cybersecurity industry to describe the practice of searching through the trash for useful information
- Uses the promise of an item or good to entice victims
- A physical security breach whereby an unauthorized person follows an authorized individual into a secured premise
- A cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malicious software
Down
- Used to obtain information such as personal identification numbers (PINs), passwords and other confidential data by looking over the victim's shoulder.
- Sending fake emails from what seems to be a legitimate source
- Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
8 Clues: Uses the promise of an item or good to entice victims • Sending fake emails from what seems to be a legitimate source • Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system • Used in the cybersecurity industry to describe the practice of searching through the trash for useful information • ...
Key vocabulary 2025-08-30
Across
- process to protect individuals, organisations and governments from digital attacks
- the ability for IT systems such as applications, storage, databases and networking to continue to change in size
Down
- software written te harm or cause issues in a computer also called malicious code
- a mestizemetra how comsistently an IT system an component performs
4 Clues: a mestizemetra how comsistently an IT system an component performs • software written te harm or cause issues in a computer also called malicious code • process to protect individuals, organisations and governments from digital attacks • the ability for IT systems such as applications, storage, databases and networking to continue to change in size
CROSSWORD LEVEL-2 2023-07-16
Across
- A technique used to solve a problem or make a decision based on experience and intuition rather than systematic analysis.
- of Things Network of interconnected physical devices and objects
- The practice of secure communication through techniques such as encryption and decryption.
- The practice of protecting computer systems, networks, and data from unauthorized access, damage, or theft.
- A computational model inspired by the structure and functioning of the human brain, used for pattern recognition and machine learning tasks.
- A step-by-step procedure for solving a problem
- Manipulation of matter at the atomic or molecular scale
Down
- Measurement and analysis of unique biological characteristics
- A branch of computer science that utilizes principles from quantum mechanics to perform complex computations.
- Computing Utilizes quantum mechanics principles to perform complex computations
- learning A subset of artificial intelligence that enables computer systems to learn and improve from experience without being explicitly programmed.
- Digital form of currency secured by cryptography
- The process of creating a virtual version of a resource, such as a server, operating system, or network.
- Reality Immersive technology that creates a simulated environment
- The ability of multiple tasks or processes to execute simultaneously in a shared environment.
- Protection of computer systems from theft, damage, or disruption
- A network security system that monitors and controls incoming and outgoing network traffic.
- Reality Technology that overlays digital information onto the real world
- Extremely large and complex data sets that require advanced tools and techniques to analyze and extract meaningful insights.
- Learning Enables systems to learn and improve from experience without explicit programming
20 Clues: A step-by-step procedure for solving a problem • Digital form of currency secured by cryptography • Manipulation of matter at the atomic or molecular scale • Measurement and analysis of unique biological characteristics • of Things Network of interconnected physical devices and objects • Protection of computer systems from theft, damage, or disruption • ...
Computer Science Terms 2024-08-26
Across
- This is when you press the button on your computer or mouse.
- When a computer thinks for itself.
- This is used in coding when there is a repeating pattern.
- A string of commands or directions used by programmings languages.
- This is an instruction that you give to your computer.
- A statement that is either true or false [ex. front_is_wter()]
- This is the thing that a computer does after you give it an instruction.
Down
- This is the process of finding and fixing the bugs in your computer code.
- This is a giant network of computers that allows people all over the world to share information and communicate with each other.
- This is a way for computers and devices to talk to each other that is wireless.
- A piece of code that helps computer to make a decision.
- This is like a tightly locked door that protects our computers.
- A set of instructions that tell a computer to do.
- Thes is a storage place somewhere far away, which you access using the internet.
- This is a secret language made up of millions of zeroes and ones.
- When there is a glitch in the system and the code wont work it there might be a?
- This is information that is stored on a computer
- A single, simple instruction that a coder can give a computer.
18 Clues: When a computer thinks for itself. • This is information that is stored on a computer • A set of instructions that tell a computer to do. • This is an instruction that you give to your computer. • A piece of code that helps computer to make a decision. • This is used in coding when there is a repeating pattern. • ...
3.6 Fundamentals of Networks Part 2 2021-11-22
Across
- When organisations employ specialists to simulate potential attacks on their system. It is used to identify possible weaknesses in their cyber security.
- Uses parts of a person to identify them and allow them access.
- When hackers send emails or texts to people claiming to be from a well-known business.
- Can see what a user is doing and sends that info back to the hacker.
- When someone pretends to be someone else to persuade the victim to share information.
- Sends an email to verify a users identity.
- What term is used for protecting networks, data, programs and computers against damage cyber attacks and unauthorised access.
- Simulates an external cyber attack. The person carrying out the attack will not be given any credentials, but they will have to carry out the attack in any way they can.
- A method of hacking where a user is directed to a fake version of a website.
Down
- The term used when data is transferred into a code that cannot be hacked.
- Watching over someones shoulder.
- Engineering Using people to gain private information or access to networks.
- Simulates a malicious insider who has knowledge of the system.
- USB drive or SD card
- Common way of preventing hackers accessing information.
- Simulates a person who has access to the target.
16 Clues: USB drive or SD card • Watching over someones shoulder. • Sends an email to verify a users identity. • Simulates a person who has access to the target. • Common way of preventing hackers accessing information. • Uses parts of a person to identify them and allow them access. • Simulates a malicious insider who has knowledge of the system. • ...
Trends in Healthcare Crossword Puzzle 2019-09-16
Across
- everyone with the same ____________ is in one payment group as a method of cost containment
- general direction in which something is developing or changing
- refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other
- is the protection of internet-connected systems, including hardware, software and data, from cyberattacks
- health related ____________ are one of the main reasons for high costs of healthcare
- therapy, massage, breathing techniques and yoga are all examples of ______ management
- less expensive than inpatient care
Down
- prevents illness and disease
- recycling and turning off electronics are examples of energy _______________
- improves mood, overall physical and mental wellness, improves stamina, immune system function, and releases endorphins
- the action or process of combining a number of things into a single more effective or coherent whole
- physical, social, intellectual, spiritual, emotional, occupational, financial, and environmental are all examples of this
- the protection or promotion of the interests of consumers.
- baby ________ are individuals born between 1946 and 1964, which has created an increased population of aging adults and increased need for geriatric medicine
- _________ medicine promotes physical, emotional, social, intellectual, and spiritual well-being
- home _________ allows patient to be in the comfort of his or her own home
16 Clues: prevents illness and disease • less expensive than inpatient care • the protection or promotion of the interests of consumers. • general direction in which something is developing or changing • home _________ allows patient to be in the comfort of his or her own home • recycling and turning off electronics are examples of energy _______________ • ...
A Little SaaS-y 2024-07-16
Across
- Processes involved in ensuring that a company can continue operating during and after a disaster or disruptive event.
- Popular accounting SaaS application.
- CMS, CRM, automations and more business-critical data is stored and used by many sales and marketing teams.
- One Single Platform to Protect Your SaaS Data Footprint.
- Software program or suite of programs that performs specific functions or tasks for users.
- The copy of important information and files stored separately to protect against data loss, corruption, or damage.
- Any software designed to harm, exploit, or compromise the functionality, security, or data of a computer, network, or device.
- A single instance of a software application that serves multiple customers.
Down
- When SaaS apps are used throughout the organization without centralized management, it is referred to as SaaS ____.
- the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Developers heavily rely on this app for project management, bug tracking, and more.
- To convert information or data into a code, especially to prevent unauthorized access.
- A contract between an MSP and their customer that defines the level of service expected.
- The amount of time a SaaS application is available and operational.
- Software as a service
- The individual or organization that uses the SaaS application.
16 Clues: Software as a service • Popular accounting SaaS application. • One Single Platform to Protect Your SaaS Data Footprint. • The individual or organization that uses the SaaS application. • The amount of time a SaaS application is available and operational. • A single instance of a software application that serves multiple customers. • ...
Internal Audit Awareness Month - Enhancing Impact 2025-05-09
Across
- Any action taken to enhance risk management and increase the likelihood that established objectives and goals will be achieved.
- Protecting critical systems and sensitive information from digital attacks.
- The freedom from conditions that threaten the ability of the internal audit activity to carry out internal audit responsibilities in an unbiased manner.
- The quality of being honest and having strong moral principles.
- The process of two or more people, entities or organizations working together to complete a task or achieve a goal.
- Clearly conveying audit findings and recommendations to stakeholders, using plain language and avoiding jargon.
Down
- Protecting sensitive information.
- Ensuring adherence to laws, regulations, and internal policies.
- The benchmarks use to measure or evaluate the underlying subject matter.
- Any illegal act characterized by deceit, concealment, or violation of trust.
- Delivering timely, data-driven insights to enable senior leadership and boards to make informed decisions.
- The person conducting the Internal Audit.
- The application of procedures to some or all items in a population.
- A specific internal audit assignment, task, or review activity.
- An unbiased mental attitude that allows internal auditors to perform engagements in such a manner that they believe in their work product and that no quality compromises are made.
- The uncertainty of an event occurring that could have an impact on the achievement of objectives.
16 Clues: Protecting sensitive information. • The person conducting the Internal Audit. • Ensuring adherence to laws, regulations, and internal policies. • A specific internal audit assignment, task, or review activity. • The quality of being honest and having strong moral principles. • The application of procedures to some or all items in a population. • ...
Browsing safely 2025-06-08
Across
- ______ is a popular anti-virus.
- It is the collection of technologies, processes, and practices designed to protect networks, computers, programs, and data from attack,damage,or unauthorised access.
- ____ is any criminal activity intended to harm anyone using a computer and internet connection.
- ____ also known as unethical hacker.
- It refer to the act of stealing and misusing someone's personal Plus information.
- Standard form of vital information resources under seize.
- It is the process of befriending children on social media to facilitate online or physical sexual abuse.
- Never share your ____ while chatting.
- A ____ is a software that help in preventing unauthorised access to your computer.
- It is a computer program that is designed to identify,prevent,and remove viruses from a computer.
Down
- It is an act ab harming or harassing using information technology in deliberate manner.
- _____ is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- _______ is the use of illegal method to get money or other things that belong to bank or its customers.
- ____ means hoaxing or misleading.
- It referred to an illegal entry into a computer system or network.
- It is the act of sending an email to a user; misleading him to believe that it is from a trusted person or organisation.
16 Clues: ______ is a popular anti-virus. • ____ means hoaxing or misleading. • ____ also known as unethical hacker. • Never share your ____ while chatting. • Standard form of vital information resources under seize. • It referred to an illegal entry into a computer system or network. • It refer to the act of stealing and misusing someone's personal Plus information. • ...
Browsing Safely 2025-06-17
Across
- refers to an act of stealing and misusing someone's personal information.
- means hoaxing or misleading.
- is a collection of technologies, processes and practices designed to protect network, computer, programs, and the data from attack, damage aur unauthorised access.
- any information about a people can be found using a
- is the use of illegal method to get money or other things that belong to a bank or it customers.
- Question
- is a software that helps in preventing unauthorised access to your computer.
- is the full form of virus.
Down
- the receiver of a message is fooled into believing that the message received by him is from a trusted source, which is actually not true.
- is used to conduct terrorism through the use of computers and internet in order to cause fear and panic.
- the process of befriending children on social media to facilitate online or physical sexual abuse
- is the act of sending an email to a user misleading him to believe that it is from a trusted person or organisation.
- refers to illegal entry into a computer system or network.
- is any criminal activity intended to harm anyone using a computer and an Internet connection.
- is a popular anti-virus software.
- cyber criminals are also called
16 Clues: Question • is the full form of virus. • means hoaxing or misleading. • cyber criminals are also called • is a popular anti-virus software. • any information about a people can be found using a • refers to illegal entry into a computer system or network. • refers to an act of stealing and misusing someone's personal information. • ...
Love (fraud) is in the air 2024-02-06
Across
- Email messages that claim to be from a reputable business or organization and deceives individuals into disclosing private personal information
- The "S" in MISP
- "______" is software that my grant a scammer remote access to a computer and collects personal information from member device without their knowledge
- A favorite sweet treat of choice enjoyed by many during this holiday
- Criminals begin “_________ scams” by romancing unknowing victims-to-be, gaining their trust and making promises of love and new lives together.
- A classic flower that symbolizes love
Down
- The "I" in MISP
- "_____________" is the act of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information
- A symbol of Valentine’s day - identified by a baby / angel holding a bow and arrow
- The holiday celebrated on February 14th - "________'s Day"
- These are scam attempts that come via text message
- Valentine’s Day revolves around showing "_____" for those you are close to
- The "M" in MISP
- "________" is when Scammers create a "false" or "shadow copy" of a real website, email or phone number which is indistinguishable from the real thing.
14 Clues: The "I" in MISP • The "S" in MISP • The "M" in MISP • A classic flower that symbolizes love • These are scam attempts that come via text message • The holiday celebrated on February 14th - "________'s Day" • A favorite sweet treat of choice enjoyed by many during this holiday • Valentine’s Day revolves around showing "_____" for those you are close to • ...
Activity 1 2024-08-25
Across
- The use and development of computer systems that are able to learn and adapt without following explicit instructions, by using algorithms and statistical models to analyze and draw inferences from patterns in data.
- A system of interconnected public web pages accessible through the Internet.
- The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks.
Down
- The simulation of human intelligence processes by machines, especially computer systems.
- The process of exchanging information and ideas.
- A multidisciplinary field comprising aspects of computer science, physics, and mathematics that utilizes quantum mechanics to solve complex problems faster than on classical computers.
6 Clues: The process of exchanging information and ideas. • A system of interconnected public web pages accessible through the Internet. • The simulation of human intelligence processes by machines, especially computer systems. • The application of technologies and controls to protect systems, networks, programs, devices and data from cyber attacks. • ...
Joon XXXXXXXXi 8G: Social engineering 2023-02-02
Across
- AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA.
- A SET OF METHODS USED BY CYBERCRIMINALS TO DECEIVE INDIVIDUALS INTO HANDING OVER INFORMATION THAT THEY CAN USE FOR FRAUDULENT PURPOSES.
Down
- CYBER_________
- AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY.
4 Clues: CYBER_________ • AN ATTACK DESIGNED TO STEAL A VICTIM'S PASSWORD OR OTHER SENSITIVE DATA. • AN ATTACK IN WHICH THE PERPETRATOR INVENTS A SCENARIO IN ORDER TO CONVINCE THE VICTIM TO GIVE THEM DATA OR MONEY. • A SET OF METHODS USED BY CYBERCRIMINALS TO DECEIVE INDIVIDUALS INTO HANDING OVER INFORMATION THAT THEY CAN USE FOR FRAUDULENT PURPOSES.
Key vocabulary 2025-08-30
Across
- software written te harm or cause issues in a computer also called malicious code
- the ability for IT systems such as applications, storage, databases and networking to continue to change in size
Down
- process to protect individuals, organisations and governments from digital attacks
- a mestizemetra how comsistently an IT system an component performs
4 Clues: a mestizemetra how comsistently an IT system an component performs • software written te harm or cause issues in a computer also called malicious code • process to protect individuals, organisations and governments from digital attacks • the ability for IT systems such as applications, storage, databases and networking to continue to change in size
crossword 2023-02-04
Across
- What device can make and receive phone calls without a traditional phone line?
- What is a device that senses and tracks an individual's movements?
- What is a set of instructions for a computer to perform a specific task?
Down
- What is the practice of securing IoT devices and networks from cyber threats called?
- What is the term used for a device that switches network traffic between different computer networks based on the network address of the data?
5 Clues: What is a device that senses and tracks an individual's movements? • What is a set of instructions for a computer to perform a specific task? • What device can make and receive phone calls without a traditional phone line? • What is the practice of securing IoT devices and networks from cyber threats called? • ...
Lesson 3 2024-02-13
Across
- The process of verifying the identity of individuals or entities in digital interactions.
- The goal of keeping information private and secure from unauthorized access.
Down
- A general term emphasizing the overall aim of protecting digital data from harm or unauthorized access, encompassing aspects of cybersecurity but with a broader, more inclusive appeal.
- The practice of keeping information hidden or unexposed to unauthorized entities, emphasizing the broader goal of confidentiality.
- The objective of maintaining the accuracy and trustworthiness of data.
5 Clues: The objective of maintaining the accuracy and trustworthiness of data. • The goal of keeping information private and secure from unauthorized access. • The process of verifying the identity of individuals or entities in digital interactions. • ...
Puzzle - 7 2022-10-11
Across
- a regular system update released by developers to fix bugs and other software vulnerabilities
- the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- The programs and other operating information used by a computer
Down
- relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- a list of permitted items that are automatically let through whatever gate is being used.
- a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
- State of being safe / free from danger or threat
- a policy of the organization allowing, encouraging or requiring its employees to use their personal devices such as smartphones, Tablet PCs, and laptops for official business purposes
9 Clues: State of being safe / free from danger or threat • The programs and other operating information used by a computer • a list of permitted items that are automatically let through whatever gate is being used. • a regular system update released by developers to fix bugs and other software vulnerabilities • ...
Captions 2025-06-10
Across
- A stylesheet language used to define and apply styles to your Web Pages in HTML.
- A dynamic, open-source programming language that empha sizes simplicity and productivity, often used for web development.
- It is a standard mark-up language used to create Web Pages.
- Use of illegal methods to get money or other things that belong to a Bank or its customers.
- A collection of technologies designed to protect computers from unauthorised access.
- It is an act of hoaxing or misleading people into deceiving that the bogus e-mail received by them is from a trusted source, which is actually not true.
Down
- A set of programs used to disrupt the normal functioning of the computer by hampering its memory, data and other essential resources.
- Any criminal activity using the computer or the internet connection to harm or steal data.
- Any software designed to harm computer systems or networks.
- A set of instructions, written in a programming language, that a computer uses to perform tasks.
- An illegal entry into a computer system.
- It is a statically typed, general-purpose programming language developed by JetBrains.
12 Clues: An illegal entry into a computer system. • Any software designed to harm computer systems or networks. • It is a standard mark-up language used to create Web Pages. • A stylesheet language used to define and apply styles to your Web Pages in HTML. • A collection of technologies designed to protect computers from unauthorised access. • ...
CROSSWORD INTEGRATION on ICT 2024-09-29
Across
- This is a deceptive method used to steal sensitive information by pretending to be a trustworthy source
- It refers to the physical components of a computerthat you can touch and see
- These devices display or output data from a computer
- This software helps manage a company's interactions with current and potential customers
- This is harmful software designed to damage or disrupt systems
- It involves organizing and maintaining data processes efficiently
- This type of software helps users perform specific tasks like writing or calculating
- This is a set of instructions that tells a computer how to perform tasks
- It involves protecting computers and networks from unauthorized access or attacks
- It integrates core business processes into a single system
Down
- This allows users to store and access data over the internet instead of local hardware
- These devices allow users to enter data into a computer
- It manages the hardware and software resources of a computer system
- This is a security system that controls the incoming and outgoing network traffic
- It refers to the unauthorized access or manipulation of computer systems
- It secures access to systems or information using a secret combination of characters
- This includes all technologies used to handle telecommunications, broadcasting, and information systems
- It involves encoding information so that only authorized parties can understand it
18 Clues: These devices display or output data from a computer • These devices allow users to enter data into a computer • It integrates core business processes into a single system • This is harmful software designed to damage or disrupt systems • It involves organizing and maintaining data processes efficiently • ...
